The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system

Donghyuk Yim, Jae Yoon Lim, Seunghwan Yun, Sun Hee Lim, Okyeon Yi, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Nowadays the more wireless mobile communication technology has been improved, the more wireless users has been increased. On the other hand, cyber crime in WLAN has been gradually increasing. To solve the cyber crime in wireless environment, WLAN Forensic is not only counterproposal but also resolution of the cyber crime in WLAN. In this paper, we propose the evidence collection of Denial of Service (DoS) attack in WLAN by applying WLAN Forensic Profiling System.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Information Science and Security, ICISS 2008
PublisherIEEE Computer Society
Pages197-204
Number of pages8
ISBN (Print)076953080X, 9780769530802
DOIs
Publication statusPublished - 2008
EventInternational Conference on Information Science and Security, ICISS 2008 - Seoul, Korea, Republic of
Duration: 2008 Jan 102008 Jan 12

Publication series

NameProceedings of the International Conference on Information Science and Security, ICISS 2008

Other

OtherInternational Conference on Information Science and Security, ICISS 2008
CountryKorea, Republic of
CitySeoul
Period08/1/1008/1/12

Keywords

  • Forensic
  • WLAN
  • Wireless Forensic

ASJC Scopus subject areas

  • Computer Science(all)
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system'. Together they form a unique fingerprint.

  • Cite this

    Yim, D., Lim, J. Y., Yun, S., Lim, S. H., Yi, O., & Lim, J. (2008). The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system. In Proceedings of the International Conference on Information Science and Security, ICISS 2008 (pp. 197-204). [4438234] (Proceedings of the International Conference on Information Science and Security, ICISS 2008). IEEE Computer Society. https://doi.org/10.1109/ICISS.2008.8